首页 | 本学科首页   官方微博 | 高级检索  
     

基于密钥分发和密文抽样的云数据确定性删除方案
引用本文:王敏燊,熊金波,林倩,王丽丽. 基于密钥分发和密文抽样的云数据确定性删除方案[J]. 计算机应用, 2018, 38(1): 194-200. DOI: 10.11772/j.issn.1001-9081.2017071751
作者姓名:王敏燊  熊金波  林倩  王丽丽
作者单位:福建师范大学 数学与信息学院, 福州 350117
基金项目:国家自然科学基金资助项目(61402109,61370078),福建省自然科学基金资助项目(2015J05120),福建省高校杰出青年科研人才培育计划项目。
摘    要:针对云数据过期后不及时删除容易导致非授权访问和隐私泄露等问题,结合加密算法和分布式哈希表(DHT)网络,提出一种基于密钥分发和密文抽样的云数据确定性删除方案。首先加密明文,再随机抽样密文,将抽样后的不完整密文上传到云端;然后评估DHT网络中各节点的信任值,使用秘密共享算法处理密钥,并将子密钥分发到信任值高的节点上;最后,密钥通过DHT网络的周期性自更新功能实现自动删除,通过调用Hadoop分布式文件系统(HDFS)的接口上传随机数据覆写密文,实现密文的完全删除。通过删除密钥和云端密文实现云数据的确定性删除。安全性分析和性能分析表明所提方案是安全和高效的。

关 键 词:云存储  信任值评估  密钥分发  密文删除  分布式哈希表网络  
收稿时间:2017-07-19
修稿时间:2017-09-15

Cloud data assured deletion scheme based on key distribution and ciphertext sampling
WANG Minshen,XIONG Jinbo,LIN Qian,WANG Lili. Cloud data assured deletion scheme based on key distribution and ciphertext sampling[J]. Journal of Computer Applications, 2018, 38(1): 194-200. DOI: 10.11772/j.issn.1001-9081.2017071751
Authors:WANG Minshen  XIONG Jinbo  LIN Qian  WANG Lili
Affiliation:College of Mathematics and Informatics, Fujian Normal University, Fuzhou Fujian 350117, China
Abstract:If cloud data is not deleted in time after expiration, it may lead to unauthorized access and privacy leakage. For above issue, a cloud data assured deletion scheme based on key distribution and ciphertext sampling was proposed. It was composed of the encryption algorithm and Distributed Hash Table (DHT) network. Firstly, the plaintext was encrypted into the ciphertext. The ciphertext was sampled by random sampling algorithm. The incomplete ciphertext was uploaded to the cloud. Secondly, The trust value of each node in the DHT network was evaluated by evaluative method. The encryption key was processed into the subkeys by Shamir secret sharing algorithm, and the subkeys were distributed into the nodes with high trust degree. Finally, the encryption key was automatically deleted by the periodic self-updating function of the DHT network. The ciphertext in the cloud was overwritten by uploading random data through the Hadoop Distributed File System (HDFS)'s interface. Assured deletion of cloud data was done by deleting the encryption key and the ciphertext. The security analysis and performance analysis demonstrate that the proposed scheme is secure and efficient.
Keywords:cloud storage   trust value evaluation   key distribution   ciphertext deletion   Distributed Hash Table (DHT) network
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号